Verifying LDAP Configurations
Note |
You can only perform this procedure through the Cisco UCS Central CLI. |
It verifies the configuration of the Lightweight Directory Access Protocol (LDAP) provider or the LDAP provider group.
Verifying LDAP Native Authentication
When LDAP fails, verify that Cisco UCS Central can communicate with the LDAP provider:
-
The server responds to the authentication request if you provide the correct username and password.
-
The roles and locales defined on the user object in the LDAP are downloaded.
-
The LDAP group authorization is turned on and the LDAP groups are downloaded.
The first step is to verify that Cisco UCS Central is configured with native authentication.
Procedure
Command or Action | Purpose | |
---|---|---|
Step 1 |
UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 |
UCSC(policy-mgr)# scope org |
|
Step 3 |
UCSC(policy-mgr) /org # scope device-profile |
|
Step 4 |
UCSC(policy-mgr) /org/device-profile # scope security |
|
Step 5 |
UCSC(policy-mgr) /org/device-profile/security # scope auth-realm |
|
Step 6 |
UCSC(policy-mgr) /org/device-profile/security/auth-realm # show default-auth |
Following is an example of the result
|
Verifying the LDAP Provider Configuration
Procedure
Command or Action | Purpose | |
---|---|---|
Step 1 |
UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 |
UCSC(policy-mgr)# scope org |
|
Step 3 |
UCSC(policy-mgr) /org # scope device-profile |
|
Step 4 |
UCSC(policy-mgr) /org/device-profile # scope security |
|
Step 5 |
UCSC(policy-mgr) /org/device-profile/security # scope ldap |
|
Step 6 |
UCSC(policy-mgr) /org/device-profile/security/ldap # show server detail |
|